On the security and privacy of Internet of Things architectures and systems E Vasilomanolakis, J Daubert, M Luthra, V Gazis, A Wiesmaier, P Kikiras 2015 International Workshop on Secure Internet of Things (SIoT), 49-57, 2015 | 120 | 2015 |
A survey of technologies for the internet of things V Gazis, M Görtz, M Huber, A Leonardi, K Mathioudakis, A Wiesmaier, ... 2015 International Wireless Communications and Mobile Computing Conference …, 2015 | 113 | 2015 |
Introduction to public key infrastructures JA Buchmann, E Karatsiolis, A Wiesmaier Springer Science & Business Media, 2013 | 89 | 2013 |
Short paper: IoT: Challenges, projects, architectures V Gazis, M Goertz, M Huber, A Leonardi, K Mathioudakis, A Wiesmaier, ... 2015 18th International Conference on Intelligence in Next Generation …, 2015 | 81 | 2015 |
A view on privacy & trust in IoT J Daubert, A Wiesmaier, P Kikiras 2015 IEEE International Conference on Communication Workshop (ICCW), 2665-2670, 2015 | 67 | 2015 |
In-packet Bloom filters: Design and networking applications CE Rothenberg, CAB Macapuna, MF Magalhães, FL Verdi, A Wiesmaier Computer Networks 55 (6), 1364-1378, 2011 | 63 | 2011 |
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: a survey M Vigil, J Buchmann, D Cabarcas, C Weinert, A Wiesmaier Computers & Security 50, 16-32, 2015 | 52 | 2015 |
Long term confidentiality: a survey J Braun, J Buchmann, C Mullan, A Wiesmaier Designs, Codes and Cryptography 71 (3), 459-478, 2014 | 35 | 2014 |
Towards the smart grid: substation automation architecture and technologies A Leonardi, K Mathioudakis, A Wiesmaier, F Zeiger Advances in Electrical Engineering 2014, 2014 | 32 | 2014 |
A comprehensive reference architecture for trustworthy long-term archiving of sensitive data D Huhnlein, U Korte, L Langer, A Wiesmaier 2009 3rd International Conference on New Technologies, Mobility and Security …, 2009 | 26 | 2009 |
On the design and implementation of the Open eCard App D Hühnlein, D Petrautzki, J Schmölz, T Wich, M Horsch, T Wieland, ... SICHERHEIT 2012–Sicherheit, Schutz und Zuverlässigkeit, 2012 | 16 | 2012 |
The state of the art in DNS spoofing U Steinhoff, A Wiesmaier, R Araújo Proc. 4th Intl. Conf. Applied Cryptography and Network Security (ACNS), 2006 | 16 | 2006 |
End-2-End privacy architecture for IoT S Funke, J Daubert, A Wiesmaier, P Kikiras, M Muehlhaeuser 2015 IEEE Conference on Communications and Network Security (CNS), 705-706, 2015 | 14 | 2015 |
Outflanking and securely using the PIN/TAN-System A Wiesmaier, M Fischer, M Lippert, J Buchmann arXiv preprint cs/0410025, 2004 | 13 | 2004 |
Directory Based Registration in Public Key Infrastructures. M Lippert, EG Karatsiolis, A Wiesmaier, JA Buchmann IWAP, 17-32, 2005 | 12 | 2005 |
Using LDAP Directories for Management of PKI Processes V Karatsiolis, M Lippert, A Wiesmaier European Public Key Infrastructure Workshop, 126-134, 2004 | 12 | 2004 |
Privacy in smart metering ecosystems P Ebinger, JLH Ramos, P Kikiras, M Lischka, A Wiesmaier International Workshop on Smart Grid Security, 120-131, 2012 | 11 | 2012 |
An efficient mobile PACE implementation A Wiesmaier, M Horsch, J Braun, F Kiefer, D Hhnlein, F Strenzke, ... Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 9 | 2011 |
Data ingestion and analytics platform with systems, methods and computer program products useful in conjunction therewith A Wiesmaier, O Haller US Patent App. 15/865,628, 2018 | 8 | 2018 |
Security perspectives for collaborative data acquisition in the internet of things V Gazis, CG Cordero, E Vasilomanolakis, P Kikiras, A Wiesmaier International Internet of Things Summit, 271-282, 2014 | 8 | 2014 |